介绍了有关femmlab与mathematica计算方面的实例及方法。通过学习,可以掌握一门新的仿真技术,并通过有关理论来模拟仿真计算案例。
2020-01-03 11:36:03 6.29MB 有限元 fem mathematical
1
关于随机数的电子书,最新版本,经典著作,适合工学理学等领域
2020-01-03 11:18:01 44.01MB Stochastic Numerics
1
经典数学函数书,Abramowitz编著,Dover Publications, 1965
2019-12-24 03:39:13 23.34MB Handbook of Mathematical Functions
1
高难习题集——Problems in Mathematical Analysis, Piotr Biler, Alfred Witkowski, Dekker,.pdf
2019-12-23 03:04:59 7.03MB 习题集 数学
1
AMPL.A.Mathematical.Programming.Language.v2014.07.04.Cracked-EAT 另推荐官方IDE:https://ampl.com/products/IDE/
2019-12-21 22:26:30 4.73MB AMPL
1
统计书籍:mathematical statistics and data analysis 2ed (djvu version)
2019-12-21 22:24:48 6.06MB statistics book
1
mathematical methods and algorithms for signal processing英文原版pdf,很经典的书哦
1
Love, A Treatise on Mathematical Theory of Elasticity (1944)(ISBN 0486601749) 第一部分(共三部分)
2019-12-21 22:18:29 17.17MB partt1
1
Solution.Manual.to.Introduction.to.Mathematical.statistics. Hogg..McKean.and.Craig
2019-12-21 22:14:24 4.07MB Solution Hogg
1
Review From the reviews: "The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered … . there is abundance of examples and proposed exercises at the end of each chapter. … This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008) "This book focuses on public key cryptography … . Hoffstein, Pipher, and Silverman … provide a thorough treatment of the topics while keeping the material accessible. … The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises … . The volume includes a nice bibliography. … Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009) "For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. … it is written in a way that makes you want to keep reading. … The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. … it could even be used with students who are just learning how to execute rigorous mathematical proofs. … I strongly believe that it finds the right tone for today’s students … ." (Burkhard Englert, ACM Computing Reviews, March, 2009) "The exercises and text would make an excellent course for undergraduate independent study. … This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. … This book would probably be best suited for a graduate course that focused on public key cryptography, for under
2019-12-21 22:13:28 7.38MB 密码学
1